“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
Microsoft Patches Critical Azure AI Face Service Vulnerability with CVSS 9.9 Score [email protected] (The Hacker News)
Microsoft has released patches to address two Critical-rated security flaws impacting Azure AI Face Service and Microsoft Account that could allow a malicious actor to escalate their privileges under certain conditions. The flaws are listed below – CVE-2025-21396 (CVSS score: 7.5) – Microsoft Account Elevation of Privilege Vulnerability CVE-2025-21415 (CVSS score: 9.9) – Azure AI…
-
Google Patches 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104 [email protected] (The Hacker News)
Google has shipped patches to address 47 security flaws in its Android operating system, including one it said has come under active exploitation in the wild. The vulnerability in question is CVE-2024-53104 (CVSS score: 7.8), which has been described as a case of privilege escalation in a kernel component known as the USB Video Class…
-
Microsoft SharePoint Connector Flaw Could’ve Enabled Credential Theft Across Power Platform [email protected] (The Hacker News)
Cybersecurity researchers have disclosed details of a now-patched vulnerability impacting the Microsoft SharePoint connector on Power Platform that, if successfully exploited, could allow threat actors to harvest a user’s credentials and stage follow-on attacks. This could manifest in the form of post-exploitation actions that allow the attacker to send requests to the SharePoint API on…
-
768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023 [email protected] (The Hacker News)
As many as 768 vulnerabilities with designated CVE identifiers were reported as exploited in the wild in 2024, up from 639 CVEs in 2023, registering a 20% increase year-over-year. Describing 2024 as “another banner year for threat actors targeting the exploitation of vulnerabilities,” VulnCheck said 23.6% of known exploited vulnerabilities (KEV) were known to be…
-
PyPI Introduces Archival Status to Alert Users About Unmaintained Python Packages [email protected] (The Hacker News)
The maintainers of the Python Package Index (PyPI) registry have announced a new feature that allows package developers to archive a project as part of efforts to improve supply chain security. “Maintainers can now archive a project to let users know that the project is not expected to receive any more updates,” Facundo Tuesca, senior…
-
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February] [email protected] (The Hacker News)
This week, our news radar shows that every new tech idea comes with its own challenges. A hot AI tool is under close watch, law enforcement is shutting down online spots that help cybercriminals, and teams are busy fixing software bugs that could let attackers in. From better locks on our devices to stopping sneaky…
-
Coyote Malware Expands Reach: Now Targets 1,030 Sites and 73 Financial Institutions [email protected] (The Hacker News)
Brazilian Windows users are the target of a campaign that delivers a banking malware known as Coyote. “Once deployed, the Coyote Banking Trojan can carry out various malicious activities, including keylogging, capturing screenshots, and displaying phishing overlays to steal sensitive credentials,” Fortinet FortiGuard Labs researcher Cara Lin said in an analysis published last week. TheRead…
-
What Is Attack Surface Management? [email protected] (The Hacker News)
Attack surfaces are growing faster than security teams can keep up – to stay ahead, you need to know what’s exposed and where attackers are most likely to strike. With cloud adoption dramatically increasing the ease of exposing new systems and services to the internet, prioritizing threats and managing your attack surface from an attacker’s…
-
Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware [email protected] (The Hacker News)
A Russian-speaking cybercrime gang known as Crazy Evil has been linked to over 10 active social media scams that leverage a wide range of tailored lures to deceive victims and trick them into installing malware such as StealC, Atomic macOS Stealer (aka AMOS), and Angel Drainer. “Specializing in identity fraud, cryptocurrency theft, and information-stealing malware,…
-
U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network [email protected] (The Hacker News)
U.S. and Dutch law enforcement agencies have announced that they have dismantled 39 domains and their associated servers as part of efforts to disrupt a network of online marketplaces originating from Pakistan. The action, which took place on January 29, 2025, has been codenamed Operation Heart Blocker. The vast array of sites in question peddled…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova